Identify persistence mechanisms that a real attacker might establish: scheduled tasks, startup scripts, new service accounts, SSH keys, web shells, or Golden Ticket attacks. - *Document how these would be established without actually implementing long-term persistence.* In a real engagement, you mig